CVE-2023-23936
16.02.2023, 18:15
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
Vendor | Product | Version |
---|---|---|
nodejs | node.js | 16.0.0 ≤ 𝑥 < 16.19.1 |
nodejs | node.js | 18.0.0 ≤ 𝑥 < 18.14.1 |
nodejs | node.js | 19.0.0 ≤ 𝑥 < 19.6.1 |
nodejs | undici | 2.0.0 ≤ 𝑥 < 5.19.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')The software uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
References